Analysis
-
max time kernel
110s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
6a1095d600f2853d75f55d5283612eb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a1095d600f2853d75f55d5283612eb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a1095d600f2853d75f55d5283612eb0N.exe
-
Size
270KB
-
MD5
6a1095d600f2853d75f55d5283612eb0
-
SHA1
6a4325520fd8ee783a1158836cd37a2b775c5959
-
SHA256
169622bd814e1abe2dc392ef813951f6b481f81ae41b00e497dbcbd372a37686
-
SHA512
4a3df7e2fc501374f43a56d4c764becd1648421d56463966dfa5480e8a9eb84d144d8940a3e78292cd04edf22b1ed8367b508fe983156fe3ea81eba104d3fb78
-
SSDEEP
6144:9Q35nVV8A85nSfKipSV1LCY+ZD/tAXPbOGEGGkLyes:9s5nVL85S3i5cD4PKGEG7yes
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 6a1095d600f2853d75f55d5283612eb0N.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1496 31C.tmp -
Loads dropped DLL 2 IoCs
pid Process 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2672-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2672-11-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2672-13-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral1/memory/764-16-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/764-14-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2672-74-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2268-76-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2672-191-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2672-195-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7BF.exe = "C:\\Program Files (x86)\\LP\\2F02\\7BF.exe" 6a1095d600f2853d75f55d5283612eb0N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\2F02\7BF.exe 6a1095d600f2853d75f55d5283612eb0N.exe File opened for modification C:\Program Files (x86)\LP\2F02\7BF.exe 6a1095d600f2853d75f55d5283612eb0N.exe File opened for modification C:\Program Files (x86)\LP\2F02\31C.tmp 6a1095d600f2853d75f55d5283612eb0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a1095d600f2853d75f55d5283612eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a1095d600f2853d75f55d5283612eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a1095d600f2853d75f55d5283612eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31C.tmp -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe 2672 6a1095d600f2853d75f55d5283612eb0N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2096 msiexec.exe Token: SeTakeOwnershipPrivilege 2096 msiexec.exe Token: SeSecurityPrivilege 2096 msiexec.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe Token: SeShutdownPrivilege 2356 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe 2356 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2672 wrote to memory of 764 2672 6a1095d600f2853d75f55d5283612eb0N.exe 31 PID 2672 wrote to memory of 764 2672 6a1095d600f2853d75f55d5283612eb0N.exe 31 PID 2672 wrote to memory of 764 2672 6a1095d600f2853d75f55d5283612eb0N.exe 31 PID 2672 wrote to memory of 764 2672 6a1095d600f2853d75f55d5283612eb0N.exe 31 PID 2672 wrote to memory of 2268 2672 6a1095d600f2853d75f55d5283612eb0N.exe 33 PID 2672 wrote to memory of 2268 2672 6a1095d600f2853d75f55d5283612eb0N.exe 33 PID 2672 wrote to memory of 2268 2672 6a1095d600f2853d75f55d5283612eb0N.exe 33 PID 2672 wrote to memory of 2268 2672 6a1095d600f2853d75f55d5283612eb0N.exe 33 PID 2672 wrote to memory of 1496 2672 6a1095d600f2853d75f55d5283612eb0N.exe 37 PID 2672 wrote to memory of 1496 2672 6a1095d600f2853d75f55d5283612eb0N.exe 37 PID 2672 wrote to memory of 1496 2672 6a1095d600f2853d75f55d5283612eb0N.exe 37 PID 2672 wrote to memory of 1496 2672 6a1095d600f2853d75f55d5283612eb0N.exe 37 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 6a1095d600f2853d75f55d5283612eb0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6a1095d600f2853d75f55d5283612eb0N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a1095d600f2853d75f55d5283612eb0N.exe"C:\Users\Admin\AppData\Local\Temp\6a1095d600f2853d75f55d5283612eb0N.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\6a1095d600f2853d75f55d5283612eb0N.exeC:\Users\Admin\AppData\Local\Temp\6a1095d600f2853d75f55d5283612eb0N.exe startC:\Users\Admin\AppData\Roaming\244C0\4D32F.exe%C:\Users\Admin\AppData\Roaming\244C02⤵
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\6a1095d600f2853d75f55d5283612eb0N.exeC:\Users\Admin\AppData\Local\Temp\6a1095d600f2853d75f55d5283612eb0N.exe startC:\Program Files (x86)\C0BFC\lvvm.exe%C:\Program Files (x86)\C0BFC2⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Program Files (x86)\LP\2F02\31C.tmp"C:\Program Files (x86)\LP\2F02\31C.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5424451b3bef648ef56d8c8bc8edac573
SHA1e37142d6174fda18725085dc7f0e4c1bea6cd61e
SHA256cf6033aa5ce666fee70c5a560b3d2f14c2c550b8b7b37012190b5f6263bee4b6
SHA512b165d86b0220e3b4833008e8e48369fca77a7b546735b0cf282967663c30d51b89b067c1f0a74afa792195057a553a98654cad3f6e6567a76f42562bf14eb16d
-
Filesize
600B
MD58dca1009b788e5d64a5467e1ed894cd2
SHA1d499997356862530c649efdccbd4b74f59f0c7f6
SHA2565d7cd03c6e94409ab56874f84bf326fe25f1a35913617be6f6f4e04cbbeea705
SHA512604fbf499c722feaa98a6a8ca1ea00bd6d7c197dab02101f9c8da733ad48e97b3b70a3d854b3d3f1fb4c3f0e018d0bec0b5ea802e9dab5d7595d3f42bc3dda9d
-
Filesize
996B
MD5c427ee7f8bc839750e6ec1e33652e966
SHA156875d167e485c8443a4ff3303c648d1b869fad1
SHA25646103f67f01e606d4761eeeef68f7f72d0345c9211194c5e878eda6de8689bf1
SHA5122a6fd21965bc66aca17c282034110e53074520bc16770d8856e50889edcd757afe93b4aed5db2b39bb84c109a43835b3b4a98763a528b6ef466651ab3e581641
-
Filesize
97KB
MD5a69098e93aa9728af7d31557da4b81a8
SHA1ef052203a8a2a07923ff8a90cff00e4321081cc9
SHA256468913e46d25b2cc68932aad1a4e080edb3fe2ee76eddc4a9de8c43b70bbbace
SHA51277a2bacd17636ca85c7dd9c014d40ede7e3956fb2a2c09d040e270bda8c350f85dc16874e7c4b505df8df3959b855e8b7e3db097e539f431af22815910d55d46